Enterprise, Internet Security

How do companies protect against a security breach?

It is no secret that any criminal will have his eyes on the biggest piece of cake he can acquire….

It is no secret that any criminal will have his eyes on the biggest piece of cake he can acquire. It is no different when it comes to cybercriminals. And for them, their favorite desserts are the big tech companies. That is why it is so important for every company to do what they can to protect against a security breach.

With huge amounts of sensitive/customer data around, exploiting just one company can give access to information worth millions of dollars!

No matter how protected business databases tend to be, hackers have very often been able to effectively slip through corporate security defense systems.

One recent example is the Petya Ransomware, a cyber attack predominantly targeted on Ukraine that caused havoc all across Europe and various other parts of the world with an estimated damage of more than $300 million to businesses – most of them being government organizations.

While large tech-companies invest millions of dollars on advanced defense systems, they are often defeated by stronger players in the wilds of the internet. It’s events like these that have pushed tech companies in stepping up their cybersecurity game like never before.

 

So, what do companies do to protect against a security breach?

 

Identity and access management (IAM) systems

Traditionally, identity management has been broadly defined as the set of policies, processes, and technologies used for managing access to information systems through the right individuals. It is the core network responsible for safeguarding digital data while effectively tracking system activities.

Even though the system itself is quite complex, the concept is simple – enhancing the privacy of data by limiting the various associated attributes to certain interactions.

 

Restricting use of unnecessary hardware and software

The higher the number of software or hardware connected to the network- the higher the number of possible exploits. Even though, software companies that sell their products to various IT firms make sure they are immune to cyber attacks, using a redundant program just isn’t worth taking the risk.

More often than not, giant tech firms make sure that different departments of their organization have devices connected to different servers, so that, even if one gets breached, the rest stay secured.

 

Background checks and constant monitoring

While IT firms carefully monitor for possible malware trying to attack their systems, there have been a good number of instances of intrusion from inside the network. No matter how high-caliber cybersecurity a company has, nothing can stop sensitive data from being stolen if it is operated by someone having a different purpose.

Lately, tech-firms have started resorting to serious background checks and screenings before giving access to important information to their employees.

 

IT training

Tech-firms and hackers, both, are well aware of each others’ goals! What that means is hackers know that their potential targets have taken the mandatory measures to try to keep them at bay from attacking their servers. Cyber culprits, however, have more than a dozen ways of sneaking into systems which they successfully achieve by capitalizing on human error.

Tech-firms have paid significant attention on developing a corporate culture focusing on security training programs aimed at teaching their employees the risks of negligent use of networks, phishing content, careless password management and improper disposal of information.

 

Encrypting Data

While having sensitive data stolen is a nightmare itself, things get a lot worse when this stolen data can be used for the wrong purposes. One way to keep data safer is by converting it into a code which can be decoded only by the entity with the decryption key. This doesn’t mean hackers might not have a solution of converting encoded information into a readable form. However, it certainly makes things harder for someone trying to obtain unauthorized access.

 

Strong Passwords and Password Managers

Using strong usernames and passwords should be a no-brainer. However, what is more important is properly storing them and that is where a password manager comes to play.

Password managers are software that saves usernames/passwords and keeps them encrypted. However, the risk here is the software itself as it is the master program containing all the passkeys. A security issue with it is enough to create a potential security risk.

 

Having information stolen is the last thing any organization would want to happen, especially if it is that of their clients. Not only it is a matter of reputation, a company might face serious legal issues for not being able to protect their customer’s information.

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Internet Security

Fix delivered for tech outage that caused chaos worldwide

The cybersecurity firm CrowdStrike has deployed a fix for a software problem that triggered one of the biggest tech outages the world has ever seen, affecting industries ranging from airlines to banking and healthcare worldwide, the company’s CEO said on Friday. All Windows computers affected by the failure will need to be manually rebooted, CrowdStrike

The cybersecurity firm CrowdStrike has deployed a fix for a software problem that triggered one of the biggest tech outages the world has ever seen, affecting industries ranging from airlines to banking and healthcare worldwide, the company’s CEO said on Friday.

All Windows computers affected by the failure will need to be manually rebooted, CrowdStrike said.

Microsoft said separately that it had fixed the underlying cause for the outage of its 365 apps and services including Teams and OneDrive, but residual impact was affecting some services.

“This is not a security incident or cyberattack. The issue has been identified, isolated and a fix has been deployed,” CrowdStrike CEO George Kurtz said in a post on the social media platform X.

In one communication to a customer reviewed by Bloomberg News, CrowdStrike’s technical supp

Read More

Continue Reading
Internet Security

Top UN court says Israeli settlements in occupied Palestinian territory are illegal

SUMMARY This is AI generated summarization, which may have errors. For context, always refer to the full article. INTERNATIONAL COURT OF JUSTICE. Protesters hold a Palestinian flag as they gather outside the International Court of Justice (ICJ) as judges rule on emergency measures against Israel following accusations by South Africa that the Israeli military operation

This is AI generated summarization, which may have errors. For context, always refer to the full article.

Top UN court says Israeli settlements in occupied Palestinian territory are illegal

INTERNATIONAL COURT OF JUSTICE. Protesters hold a Palestinian flag as they gather outside the International Court of Justice (ICJ) as judges rule on emergency measures against Israel following accusations by South Africa that the Israeli military operation in Gaza is a state-led genocide, in The Hague, Netherlands, January 26, 2024.

Piroschka van de Wouw/Reuters

(3rd UPDATE) The World Court’s opinion finds that the UN Security Council, the General Assembly, and all states have an obligation not to recognize the occupation as legal and not to give aid or support toward maintaining it

THE HAGUE, Netherlands – The United Nations’ highest court said on Friday, July 19, that Israel’s occupation of Palestinian territories and settlements there are illegal and should be withdrawn as soon as possible, in its strongest findings to date on the Israel-Palestinian conflict.

The findings by judges at the International Court of Justice (ICJ), known as the World Court, are not binding but carry weight under international law and may weaken support for Israel.

“Israeli settlements in the West Bank and East Jerusalem, and the regime associated with them, have been established and are being maintained in violation of international law,” President Nawaf Salam said, reading the findings of a 15-judge panel.

The court said Israel’s obligations include paying restitution for harm and “the evacuation of all settlers from existing settlements.”

In a swift reaction, Israel’s foreign ministry rejected the opinion as “fundamentally wrong” and one-sided, and repeated its stance that a political settlement in the region can only be reached by negotiations.

“The Jewish nation cannot be an occupier in its own land,” Israeli Prime Minister Benjamin Netanyahu’s office said in a statement.

The opinion also angered West Bank settlers as well as politicians such as Finance Minister Bezalel Smotrich, whose nationalist religious party is close to the settler movement and who himself lives in a West Bank settlement.

“The answer to The Hague – Sovereignty now” he said in a post on the social media platform X, in an apparent appeal to formally annex the West Bank.

Israel Gantz, head of the Binyamin Regional Council, one of the largest settler councils, said the ICJ opinion was “contrary to the Bible, morality and international law.”

‘No complicity’

The ICJ opinion also found that the UN Security Council, the General Assembly and all states have an obligation not to recognize the occupation as legal nor “render aid or assistance” toward maintaining Israel’s presence in the occupied territories.

The United States is Israel’s biggest military ally and supporter.

The Palestinian Foreign Ministry called the opinion “historic” and urged states to adhere to it.

“No aid. No assistance. No complicity. No money, no arms, no trade… no actions of any kind to support Israel’s illegal occupation,” Palestinian Foreign Minister Riyad al-Maliki said outside the court in The Hague.

The case stems from a 2022 request from the UN General Assembly, predating the war in Gaza that began in October.

Israel captured the West Bank, Gaza Strip and East Jerusalem – areas of historic Palestine which the Palestinians want for a state – in a 1967 war and has since built settlements in the West Bank and steadily expanded them.

Israeli leaders have argued the territories are not occupied in legal terms because they are on disputed lands, but the United Nations and most of the international community regard them as Israeli-occupied territory.

In February, more than 50 states presented their views before the court, with Palestinian representatives asking the court to find that Israel must withdraw from all the occupied areas and dismantle illegal settlements.

Israel did not participate in the hearings but filed a written statement telling the court that issuing an advisory opinion would be “harmful” to attempts to resolve the Israeli-Palestinian conflict.

The majority of states participating asked the court to find the occupation illegal, while a handful, including Canada and Britain, argued it should refuse to give an advisory opinion.

The United States had asked the court not to order the unconditional withdrawal of Israeli forces from the Palestinian territories.

The US position was that the court should issue no decision that could hurt negotiations toward a two-state solution on a “land for peace” principle.

In 2004 the ICJ ga

Read More

Continue Reading
Internet Security

The Supreme Court rules for Biden administration in a social media dispute with conservative states

The Supreme Court has sided with the Biden administration in a dispute with Republican-led states over how far the federal government can go to combat controversial social media posts on topics including COVID-19 and election security. The justices in a 6-3 v…

The Supreme Court has sided with the Biden administration in a dispute with Republican-led states over how far the federal government can go to combat controversial social media posts on topics including COVID-19 and election security. The justices in a 6-3 v…
Read More

Continue Reading
Internet Security

Modernism: A legal analysis of Nigeria’s ranching debacle

The impeccable aspirations of section 14 (1)(b) of the 1999 Constitution of the Federal Republic of Nigeria (as amended) (the “Constitution”), establish that “the security and welfare of the people shall be the primary purpose of government.” Although the purposive intent therein is excellent, however, the practical applicability and enforcement of that provision is at

The impeccable aspirations of section 14 (1)(b) of the 1999 Constitution of the Federal Republic of Nigeria (as amended) (the “Constitution”), establish that “the security and welfare of the people shall be the primary purpose of government.” Although the purposive intent therein is excellent, however, the practical applicability and enforcement of that provision is at best variable, and at worst, non-existent, regarding the political dynamite of open cattle grazing in Nigeria by pastoralists.

How can cattle grazing constitute political dynamite in Nigeria in the 21st Century, when the progressive world is at the cutting edge of Artificial Intelligence (AI) and computational thinking, which traverses transformative healthcare, precision defence systems, innovative fin-techs, robotics, social media, space exploration etc?

The legendary soul music legend, Marvin Gaye, in 1971, 53 years ago, recorded the hit song “What’s going on?” Although the context at the time was social upheaval in the United States, the same question could be posed within the extant subject matter. How is it that Nigeria is unable to effectively grapple with the banal issue of open grazing which commenced in Georgia and Florida, USA, in 1605?

The poser neatly segues into the recurrent lethal clashes between farmers and cattle herders, which has directly triggered loss of lives, displacements of farmers from their ancestral lands and extensive property destruction. Where is the government in all this and what imaginative policies have been executed? Afterall, cattle business is a private enterprise just like fish farming, pig farming, poultry farming, and snail farming in the country and the livelihoods of tens of thousands of farmers nationwide depend on all, not one, of these farming models.

What, then, underpins the ferociously devastating footprints of open cattle grazing in Nigeria? How is livestock farming developed and executed, applying modern practices, in an environmentally sustainable, peaceful and economically beneficial manner in progressive countries?

For starters, the global revenue meat market is approximately $1,460.00 billion in 2024 and market projections forecasting annual growth by 6.12% (compound annual growth rate 2024-2029). According to Statista’s 2024 analysis, China has generated the highest revenue in meat production US$273 billion; United States (US$131.60 billion); Brazil (US$37.07 billion); Canada (US$31.06 billion); United Kingdom (US$30.88 billion); Spain (US$22.70 billion), and Russia (US$22.60 billion).

Plus, the United Nations Food and Agricultural Agency asserts that livestock contributes 40% of the global value of agricultural output, supporting the livelihoods, food and nutrition security of over 1.3 billion people. These are huge numbers and the significance exposes the reality that the global livestock industry is a huge revenue catalyst and employment creator, which alleviates poverty reduction, food security and agricultural development.

In all those countries, modern agricultural practices, tech

Read More

Continue Reading